• Business Continuity

    Staying up while you recover: Double-Take Cloud provides easy server protection

    Building a backup and disaster recovery service can be time consuming and costly. You need access to a data centre where you can site racks, servers, storage and have sufficient bandwidth to support the service. Alternatively, you could just take advantage of the cloud and leave your cloud supplier to take care of all that.
    read more
  • Security

    Danger, USB!

    USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?
    read more
SecurityClient

Get better security with Vista by implementing best practices for using User Account Control - UAC

Operating your PC when you’re logged in with an Administrator account is an inherently insecure thing to do. If you’re a user with highly-elevated privileges across multiple machines or an entire Active Directory domain, running your everyday processing with these privileges can be dangerous to the point of negligence.

   
TelecomsThe Business

Unplugging the PBX to sell a VoIP installation or hosted VoIP

Unless your clients have just returned from a stint on Mars, there is every chance they will already have used VoIP, though they may not call it that. VoIP, or Internet telephony, has been one of the undoubted technology success stories of the last few years. Skype alone claims 200 million users, many of whom work in small and mid-sized businesses.

   
Security

Danger, USB!

USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?

   
ServerBusiness Continuity

Install Virtual Server 2005 R2 with our 16 step tutorial

Virtual Server 2005 R2 SP1 is a good introduction to the world of virtualisation. It’s a free download, and it’ll run on most current hardware — and will support a wide range of legacy and current guest operating systems.

 
   
SecurityClient

PDF Security: obfuscated code, hackers and other threats

Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
The same rich content that makes PDF so useful to businesses can also make it a security risk. Embedding links, images, tables and media uses JavaScript and that allows PDF files to be exploited as an attack vector for hackers.

   
Network

Optimising wireless access for the small business - tips for site surveying and analysis

Most people share the same idea of Office Hell. A plain, bland and featureless big room, with open desks that give no privacy or peace. At best, a maze of little cubicles with walls no higher than five feet eight, no door and no ceilings.

   
The Business

Partner Focus: Aamir Paul, Dell

Aamir Paul, director, Advanced Systems Group SMB, EMEA, at Dell

Small businesses depend more than ever on technology, but also face a growing challenge when it comes to managing their IT assets.

   
Business Continuity

Backing up Exchange

Like any other database, Exchange needs a little TLC if you want to recover from any downtime.

   
ServerSecurityBusiness Continuity

Backing up: save the data, save the day

All hardware fails – and backup is seen as boring and unreliable. That combination is the perfect opportunity for you to provide a service that provides business continuity and ongoing revenue. But how do you design the right backup system?

   
Telecoms

Skype and SIP

Many businesses are now using VOIP SIP connections to deliver IP telephony to user desktops or IP phones. However, until recently the popular low-cost Skype VOIP service hasn’t been compatible with SIP telephony, ?without using third-party tools like those from 3CX.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

tools If you're trying to solve connectivity problems at a customer site, you can ask a colleague back at your office to use ping and traceroute to see how the network appears to the outside world; or you can use the tools at http://www.heise-online.co.uk/networks/nettools/ to do it yourself. There are tools for looking up Mac addresses and calculating subnet masks too. If you need a more detailed trace, http://w3dt.net/tools/pathping has a pathping tool.
read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS